| A | B |
| Hardware theft | the act of stealing computer equipment |
| Hardware vandalism | the act of destroying computer equipment. |
| Software piracy | the unauthorized and illegal duplication of copyrighted software. |
| license agreement | give the user the right to use the software - you don't own it!! |
| EULA | end-user license agrement |
| information theft | when someone steals personal or confidential information. |
| encryption | the process of converting readable data into unreadable characters to prevent theft |
| decrypt | to change encrypted data back into readable form |
| digital signature | an encrypted code that a person, site or organization attached to a message. |
| secure site | a web site that uses encryption techniques |
| digital certificate | a notice that guarantees a user or web site is legitimate. |
| transport layer security | provides encryption of all data that passes between a client and server. |
| VPN | virtual private network |
| Noise | any unwanted signal that is mixed with the normal voltage entering the computer. |
| surge protector | uses special electrical components to smooth out minor noise |
| UPS | uninterruptible power supply |
| backup | a duplicate of a file, program or disk |
| restore | to copy files that were backed up back into the original location. |